Static task
static1
Behavioral task
behavioral1
Sample
61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9.exe
Resource
win10v2004-20240709-en
General
-
Target
61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9
-
Size
1.0MB
-
MD5
e49ca5f41bfdfaf5a95feaf4914743f1
-
SHA1
86fbd2d114f68f8a9e0e7bc7fc9687166cc5347c
-
SHA256
61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9
-
SHA512
a920896c336cc52995b443f513d10ac7c17dc3715653c2836c89e2f13b217d6bc68bef35321c596ff0cfedb3b52dd4777d09a851044ce5ee69410aa8e0f8ff16
-
SSDEEP
24576:iAjTYnlTin+Q01jYnGe9TA0scSQSpDeecTjuuKcvuA:iAjknYnGu00s6aCJKQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9
Files
-
61143c0b3e179ee0c60301471324ed752f7c3d44ade213cba7441d9e393433e9.exe windows:48 windows x64 arch:x64
e7e705db6110e5423df471cf63c05099
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryA
FreeLibrary
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
SetLastError
FormatMessageW
MoveFileExA
WaitForSingleObjectEx
GetEnvironmentVariableA
GetCurrentProcessId
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
WaitForMultipleObjects
SleepEx
VerSetConditionMask
VerifyVersionInfoW
CreateFileA
GetFileSizeEx
WriteConsoleW
HeapSize
GetTimeZoneInformation
DeleteFileW
GetStringTypeW
GetProcessHeap
QueryPerformanceFrequency
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetTickCount
QueryPerformanceCounter
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetExitCodeProcess
AllocConsole
CreateProcessA
GetProcAddress
CloseHandle
SetEnvironmentVariableW
Process32Next
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFullPathNameW
GetCurrentDirectoryW
SetEndOfFile
SetStdHandle
FlushFileBuffers
HeapReAlloc
GetFileAttributesExW
CreateProcessW
WaitForSingleObject
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
HeapAlloc
GetConsoleOutputCP
ReadConsoleW
GetConsoleMode
WriteFile
GetModuleFileNameW
SetFilePointerEx
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetFileInformationByHandle
GetDriveTypeW
CreateFileW
GetModuleHandleExW
ExitProcess
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
LoadLibraryA
GetLastError
Sleep
CreateToolhelp32Snapshot
TerminateProcess
VirtualAlloc
lstrlenW
GetCurrentProcess
VirtualFree
VirtualProtect
Process32First
FreeEnvironmentStringsW
GetModuleFileNameA
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
user32
ShowWindow
GetWindowThreadProcessId
EnumWindows
MessageBoxA
winspool.drv
ClosePrinter
advapi32
GetTokenInformation
AdjustTokenPrivileges
CryptAcquireContextA
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptDestroyKey
CryptImportKey
CryptEncrypt
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteExA
normaliz
IdnToAscii
IdnToUnicode
ws2_32
connect
bind
accept
select
__WSAFDIsSet
socket
htons
WSAIoctl
setsockopt
WSACleanup
WSAStartup
WSASetLastError
ntohs
WSAGetLastError
closesocket
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
send
getsockopt
listen
recv
getaddrinfo
freeaddrinfo
recvfrom
sendto
getpeername
ioctlsocket
gethostname
htonl
getsockname
wldap32
ord32
ord45
ord60
ord211
ord22
ord217
ord143
ord33
ord35
ord26
ord46
ord27
ord79
ord30
ord200
ord301
ord50
ord41
crypt32
CertOpenStore
CertFreeCertificateContext
CertFindCertificateInStore
CertEnumCertificatesInStore
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertAddCertificateContextToStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertCloseStore
CertFreeCertificateChain
sensapi
IsDestinationReachableA
netapi32
NetShareEnum
bcrypt
BCryptGenRandom
Sections
.text Size: 799KB - Virtual size: 799KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 305B - Virtual size: 293B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ